Fault-Tolerant and Scalable Key Management Protocol for IoT-Based Collaborative Groups
read more
Citations
Logical Tree Based Secure Rekeying Management for Smart Devices Groups in IoT Enabled WSN
Cryptographic Keys Generating and Renewing System for IoT Network Nodes—A Concept
A Novel Decentralized Group Key Management Scheme for Cloud-Based Vehicular IoT Networks
Partitionable Decentralized Topic Key Management
The Cryptographic Key Distribution System for IoT Systems in the MQTT Environment
References
A survey of key management for secure group communication
Tree-based group key agreement
Group Key Management Protocol (GKMP) Architecture
Securing the Internet of Things: A Standardization Perspective
Kronos: a scalable group re-keying approach for secure multicast
Related Papers (5)
Effective peer-to-peer design for supporting range query in Internet of Things applications
Enabling Computational Intelligence for Green Internet of Things: Data-Driven Adaptation in LPWA Networking
Frequently Asked Questions (10)
Q2. What future works have the authors mentioned in the paper "Fault-tolerant and scalable key management protocol for iot-based collaborative groups" ?
The authors plan to further investigate DsBGK security strength by thoroughly assessing properties such as data integrity, data authentication, and data con dentiality through an implementation using automated formal validation tools ( e. g. Avispa, Scyther ).
Q3. What is the code for generating the univariate polynomial?
To secure the transmission of tickets, the active controller generates a univariate polynomial P (x) modulo the product of two large prime numbers.
Q4. What is the cost of asymmetric primitives?
distributed protocolsinvolve a high number of exchanged messages during rekeying operations, in addition to an important computation cost due to the use of heavy asymmetric primitives.
Q5. What is the simplest way to authenticate an object?
In case of a successful authentication, the object is initialized (through a secure channel) with a long term key (i.e. SK), and a shared key with its AKMS.
Q6. What are some examples of hierarchical based protocols?
Among them, the Logical Key Hierarchy (LKH) protocol [37], later improved by the One-way Function Tree protocol [7] are typical examples.
Q7. How many members are in possession of the same tickets?
Based on experimental results (see section IV.B in [3]), DBGK outperforms its peers within a proportion of around 50% of the members in possession of the same tickets as the leaving (ejected) member.
Q8. What is the drawback of the DH primitive?
Compared to other solutions based on DH primitives, one of the drawbacks of this protocol lies in the pre-sharing assumption of the seeds, which a ects both its scalability and feasibility.
Q9. What are the main categories of group key management protocols?
In this section, the authors review the main categories under which group key management protocols are usually categorized [11] [28], namely, the centralized, the decentralized, and the distributed categories.
Q10. How do the authors set the degree of the polynomial?
the authors set the degree m of the polynomial in a way to keep the factorization not easily feasible while maintaining e ciency.